A completely different and powerful approach to research and analyze vulnerabilities, resulting in permutations, and which can be applied to both offensive and defensive approach (oriented to programming).